Multiple OpenSSL Issues Affecting OneSpan products

Advisory ID vasco-sa-20140605-openssl

Revision number 1.0

Date of Release April 13, 2015 04:30 PM UTC+1

Last update April 13, 2015 04:30 PM UTC+1

Summary

On June 5 2014 the OpenSSL Project published a security advisory describing seven vulnerabilities in the OpenSSL library. The vulnerabilities are referred to as follows:

  • SSL/TLS MITM vulnerability
  • DTLS Recursion flaw
  • DTLS Invalid Fragment vulnerability
  • SSL_MODE_RELEASE_BUFFERS NULL pointer dereference
  • SSL_MODE_RELEASE_BUFFERS session injection or denial of service
  • Anonymous ECDH denial of service
  • ECDSA NONCE Side-Channel recovery attack

Multiple OneSpan products incorporate a version of the OpenSSL library affected by one or more vulnerabilities that could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack, inject SSL/TLS session data or disrupt the availability of a service.

Impacted Products

Following products are affected by the SSL/TLS MITM vulnerability:
SSL/TLS servers

  • IDENTIKEY Server 3.3, 3.4
  • IDENTIKEY Authentication Server 3.4 SR1, 3.5
  • IDENTIKEY Federation Server 1.3, 1.4, 1.5
  • IDENTIKEY (Virtual) Appliance 3.4.5.(0,1)
  • IDENTIKEY (Virtual) Appliance 3.4.6.(0,1,2,3)
  • IDENTIKEY (Virtual) Appliance 3.5.7.(1,2,3,4)
  • aXsGUARD Gatekeeper 7.0.0 PL19, 7.1.0 PL6, 7.6.5, 7.7.0, 7.7.1, 7.7.2

SSL/TLS clients

  • LDAP Synchronization Tool 1.1, 1.2
  • Data Migration Tool 2.0, 2.1, 2.2, 2.3, 2.4
  • DIGIPASS Authentication for Windows Logon 1.1, 1.2
  • DIGIPASS Authentication for Citrix Web Interface 3.3, 3.4, 3.5, 3.6
  • DIGIPASS Authentication for IIS - Basic 3.3, 3.4, 3.5
  • DIGIPASS Authentication for Outlook Web Access - Basic 3.3, 3.4, 3.5
  • DIGIPASS Authentication for Outlook Web Access - Forms 3.3, 3.4, 3.5
  • DIGIPASS Authentication for Remote Desktop Web Access 3.4, 3.5, 3.6
  • DIGIPASS Authentication for Steel-Belted RADIUS Server 3.2, 3.3
  • Personal aXsGUARD 1.1.3, 2.1.0

Following products are affected by the SSL_MODE_RELEASE_BUFFERS NULL pointer dereference vulnerability:

  • IDENTIKEY Federation Server 1.3, 1.4, 1.5
  • aXsGUARD Gatekeeper 7.7.0, 7.7.1, 7.7.2

Following products are affected by the SSL_MODE_RELEASE_BUFFERS session injection or denial of service vulnerability:

  • IDENTIKEY Federation Server 1.3, 1.4, 1.5
  • aXsGUARD Gatekeeper 7.7.0, 7.7.1, 7.7.2

Description

On June 5 2014 the OpenSSL Project published a security advisory describing seven vulnerabilities in the OpenSSL library.
The impact of this vulnerability on OneSpan products varies depending on the affected product.

SSL/TLS Man-in-the-Middle

An unauthenticated, remote attacker with the ability to intercept traffic between an affected SSL/TLS client and SSL/TLS server could execute a man-in-the-middle attack. This vulnerability has been assigned CVE-2014-0224.

SSL_MODE_RELEASE_BUFFERS NULL pointer dereference

An unauthenticated, remote attacker could submit a malicious request designed to trigger a NULL pointer dereference. This could result in a partial or complete denial of service condition on the affected device. This vulnerability has been assigned CVE-2014-0198.

SSL_MODE_RELEASE_BUFFERS session injection or denial of service

An unauthenticated, remote attacker could submit a malicious request designed to inject content into a parallel SSL/TLS session or create a denial of service condition. This vulnerability has been assigned CVE-2010-5298.

For additional details, customers are referred to the OpenSSL Project security advisory: http://www.openssl.org/news/secadv_20140605.txt

Severity Score

The tables below denote the CVSS 2.0 vulnerability score of the various vulnerabilities.

SSl/TLS Man-in-the-Middle

CVSS Temporal Score: 3.6

CVSS Base Score: 4.3
Access Vector Access Complexity

Authentication

Confidentiality Impact Integrity Impact Availability Impact
Network Medium None None Partial None
Exploitability Remediation Level Report Confidence
Functional Official Fix Confirmed

 

SSL_MODE_RELEASE_BUFFERS NULL pointer dereference

CVSS Base Score: 7.1

Access Vector

Access Complexity

Authentication

Confidentiality Impact Integrity Impact Availability Impact
Network Medium None None None Complete
CVSS Temporal Score: 7.8
Exploitability Remediation Level Report Confidence
Functional Official Fix Confirmed

 

SSL_MODE_RELEASE_BUFFERS session injection or denial of service

CVSS Base Score: 7.8

Access Vector Access Complexity Authentication Confidentiality Impact Integrity Impact Availability Impact
Network Medium None None Partial Complete
CVSS Temporal Score: 6.4
Exploitability Remediation Level Report Confidence
Functional Official Fix Confirmed

 

Product Fixes

OneSpan has released patches for following products:

  • IDENTIKEY Federation Server 1.3.2, 1.4.2, 1.5.1 on June 13 2014

OneSpan will release following patches:

  • IDENTIKEY Authentication Server 3.5.4 on June 23 2014
  • IDENTIKEY (Virtual) Appliance 3.5.7.5 on June 23 2014
  • aXsGUARD Gatekeeper 7.7.3, the release date of which will be announced later

Customers using IDENTIKEY Server 3.3 or 3.4 and customers using IDENTIKEY Authentication Server 3.4 SR1 are recommended to upgrade to IDENTIKEY Authentication Server 3.5 and apply the appropriate fix for this version.
Customers using aXsGUARD Gatekeeper are recommended to upgrade to aXsGUARD Gatekeeper 7.7.3.
Customers using a client-side product affected by the SSL/TLS Man-in-the-Middle vulnerability are recommended to upgrade the corresponding server-side product. This approach will avoid any impact as both a vulnerable client-side and server-side product are required to exploit the vulnerability.

Location

Customers with a maintenance contract can obtain fixed product releases from MyMaintenance.

Reference

http://www.openssl.org/news/secadv_20140605.txt

Legal Disclaimer

WHILE EVERY REASONABLE EFFORT IS MADE TO PROCESS AND PROVIDE INFORMATION THAT IS ACCURATE, ALL THE CONTENT AND INFORMATION IN THIS DOCUMENT ARE PROVIDED "AS IS" AND “AS AVAILABLE,” WITHOUT ANY REPRESENTATION OR ENDORSEMENT AND WITHOUT ANY EXPRESS OR IMPLIED GUARANTEE OF CURRENCY, COMPLETENESS OR SUITABILITY, OR ANY WARRANTY INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE OR PURPOSE. YOUR USE OF THIS DOCUMENT, ANY INFORMATION PROVIDED, OR OF MATERIALS LINKED FROM THIS DOCUMENT IS AT YOUR OWN RISK. VASCO RESERVES THE RIGHT TO CHANGE OR UPDATE THE INFORMATION IN THIS DOCUMENT AT ANY TIME AND AT ITS DISCRETION, AS AND WHEN NEW OR ADDITIONAL INFORMATION BECOMES AVAILABLE. 

Copyright © 2014 VASCO Data Security, Inc., VASCO Data Security International GmbH. All rights reserved.

🖨 Multiple OpenSSL Issues Affecting OneSpan products